網(wǎng)絡(luò)化控制系統(tǒng)虛假數(shù)據(jù)注入攻擊的檢測方法研究
本文選題:信息物理系統(tǒng) + 子空間辨識 ; 參考:《北方工業(yè)大學(xué)》2017年碩士論文
【摘要】:信息物理系統(tǒng)(cyber physics system,CPS)作為新一代的智能系統(tǒng)一直得到廣泛的關(guān)注,隨著越來越多的領(lǐng)域開始應(yīng)用信息物理系統(tǒng)相關(guān)的技術(shù),信息物理系統(tǒng)的安全問題顯得尤為重要,如何保障信息物理系統(tǒng)的安全一直是廣大科研人員研究的焦點,同時這也是信息物理系統(tǒng)未來發(fā)展的前提?紤]到信息物理系統(tǒng)的概念是基于網(wǎng)絡(luò)化控制,其特征是分布式和網(wǎng)絡(luò)通信。針對此特征,攻擊者能夠很容易的從傳輸網(wǎng)絡(luò)中得到系統(tǒng)的傳輸數(shù)據(jù),系統(tǒng)的安全性極易遭到破壞。本文是從控制系統(tǒng)安全角度研究虛假數(shù)據(jù)注入攻擊,考慮一個輸出跟蹤控制系統(tǒng)動態(tài)模型是線性離散時不變高斯控制系統(tǒng),利用跟蹤誤差和系統(tǒng)助構(gòu)造一個增廣控制系統(tǒng)。首先站在攻擊者的角度,假設(shè)攻擊者能夠竊取到目標(biāo)系統(tǒng)在網(wǎng)絡(luò)中傳輸?shù)臄?shù)據(jù),通過對數(shù)據(jù)進(jìn)行分析利用子空間辨識方法對目標(biāo)系統(tǒng)進(jìn)行建模,可以間接的得到系統(tǒng)的準(zhǔn)確模型。攻擊者通過系統(tǒng)的狀態(tài)空間模型設(shè)計出一個隱秘的虛假數(shù)據(jù)注入(False Data Injection,FDI)攻擊序列,目的是在對目標(biāo)進(jìn)行攻擊后,系統(tǒng)的被控對象會偏離系統(tǒng)給定的參考信號,而且在控制器端基于殘差的檢測器通過虛假的傳感器數(shù)據(jù)無法檢測到攻擊的存在。然后針對此類攻擊,設(shè)計出一種檢測方法,旨在能夠?qū)ι鲜龅奶摷贁?shù)據(jù)攻擊進(jìn)行檢測。文章最后通過仿真和實驗分別驗證了攻擊和檢測方法的有效性。
[Abstract]:As a new generation of intelligent system, the information physics system (physics) has been paid more and more attention. With more and more fields begin to apply the related technology of information physics system, the security of information physics system becomes more and more important. How to ensure the safety of information physics system has been the focus of scientific research, and it is also the premise of the future development of information physics system. Considering that the concept of information physical system is based on networked control, it is characterized by distributed and network communication. In view of this characteristic, the attacker can easily get the data of the system from the transmission network, and the security of the system is easy to be destroyed. In this paper, a false data injection attack is studied from the point of view of control system security. A dynamic model of an output tracking control system is considered as a linear discrete time-invariant Gao Si control system, and an augmented control system is constructed by using tracking error and system assistance. First of all, from the point of view of the attacker, assuming that the attacker can steal the data transmitted by the target system in the network, the target system is modeled by analyzing the data and using the subspace identification method. The exact model of the system can be obtained indirectly. An attacker designs a secret false Data injection Data FDI attack sequence through the system's state space model, in order to deviate from the system's given reference signal after attacking the target. Moreover, the residual-based detector in the controller can not detect the attack by false sensor data. Then a detection method is designed to detect the above-mentioned false data attacks. Finally, the effectiveness of the attack and detection methods is verified by simulation and experiments.
【學(xué)位授予單位】:北方工業(yè)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP273
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 趙俊華;梁高琪;文福拴;董朝陽;;烏克蘭事件的啟示:防范針對電網(wǎng)的虛假數(shù)據(jù)注入攻擊[J];電力系統(tǒng)自動化;2016年07期
2 景博;周偉;黃以鋒;湯巍;焦曉璇;;信息物理融合系統(tǒng)及其應(yīng)用[J];空軍工程大學(xué)學(xué)報(自然科學(xué)版);2014年02期
3 李素君;周波清;羊四清;;傳感器網(wǎng)絡(luò)中魯棒性虛假數(shù)據(jù)過濾方案[J];計算機(jī)工程與應(yīng)用;2012年35期
4 李釗;彭勇;謝豐;高洋;陳冬青;徐國愛;;信息物理系統(tǒng)安全威脅與措施[J];清華大學(xué)學(xué)報(自然科學(xué)版);2012年10期
5 劉志雄;王建新;;傳感器網(wǎng)絡(luò)中一種基于地理位置的虛假數(shù)據(jù)過濾方案[J];通信學(xué)報;2012年02期
6 羅俊海;肖志輝;仲昌平;;信息物理系統(tǒng)的發(fā)展趨勢分析[J];電信科學(xué);2012年02期
7 謝婧;李曦;楊峰;;應(yīng)對虛假數(shù)據(jù)注入結(jié)合途中過濾與溯源追蹤方法[J];計算機(jī)系統(tǒng)應(yīng)用;2011年12期
8 鄭艷杰;鄭艷玲;張萬穎;;基于模糊自適應(yīng)過濾的無線傳感器網(wǎng)絡(luò)安全性分析[J];遼寧工程技術(shù)大學(xué)學(xué)報(自然科學(xué)版);2010年05期
9 劉祥志;劉曉建;王知學(xué);成巍;李建新;;信息物理融合系統(tǒng)[J];山東科學(xué);2010年03期
10 羊四清;劉平;易葉青;;傳感器網(wǎng)絡(luò)中一種過濾虛假數(shù)據(jù)的魯棒認(rèn)證機(jī)制[J];傳感技術(shù)學(xué)報;2008年05期
相關(guān)碩士學(xué)位論文 前1條
1 張彬彬;受擾線性系統(tǒng)的最優(yōu)跟蹤控制方法研究[D];哈爾濱工業(yè)大學(xué);2014年
,本文編號:1799203
本文鏈接:http://www.sikaile.net/kejilunwen/zidonghuakongzhilunwen/1799203.html